Your message dated Fri, 21 May 2010 21:37:36 +0000
with message-id <e1ofzus-00020h...@ries.debian.org>
and subject line Bug#581713: fixed in libpam-mount 2.3-1
has caused the Debian Bug report #581713,
regarding libpam-mount: umount.crypt always fails parsing its arguments
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
581713: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581713
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libpam-mount
Version: 2.1+git20100509-1
Severity: serious
Justification: this version must not enter testing

  Hi,

  The current version of libpam-mount install a broken umount.crypt.
Whatever arguments I put on the command line, I got an error:
For example:
eyak:/home/vdanjean# /sbin/mount.crypt  /srv/vdanjean/crypt/
/sbin/mount.crypt: You need to specify the mountpoint
eyak:/home/vdanjean# /sbin/mount.crypt --umount /srv/vdanjean/crypt/
Unknown option: --umount
Usage: mount.crypt [-fnrv] [-?|--help] [--usage]
eyak:/home/vdanjean# 

Looking at the code, this behavior can be explained (but is wrong :-) ).
In the main function of mtcrypt.c:
        /* primitive test, but %HXOPT_PTHRU blows up */
        if (argc >= 2 && strcmp(argv[1], "--umount") == 0) {
                struct umount_options opt;

                memset(&opt, 0, sizeof(opt));
                if (!mtcr_get_umount_options(&argc, &argv, &opt))
                        return EXIT_FAILURE;

                return mtcr_umount(&opt) > 0 ? EXIT_SUCCESS : EXIT_FAILURE;
        } else {

So, if the first argument is not --umount, we continue (as if it is a mount
invocation). If the first argument is --umount, then we parse umount arguments
but --umount is not one of them (not show on this part of code, see the file).

In the testing version of libpam-mount, the parsing in main was done
differently:
        if (strncmp(HX_basename(*argv), "umount", strlen("umount")) == 0) {
                struct umount_options opt;

                memset(&opt, 0, sizeof(opt));
                if (!mtcr_get_umount_options(&argc, &argv, &opt))
                        return EXIT_FAILURE;

                return mtcr_umount(&opt) > 0 ? EXIT_SUCCESS : EXIT_FAILURE;
        } else {
and was working.

  I set severity to grave to avoid a testing migration.

  Regards,
    Vincent



-- System Information:
Debian Release: squeeze/sid
  APT prefers oldstable
  APT policy: (500, 'oldstable'), (500, 'unstable'), (500, 'testing'), (500, 
'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.33-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam-mount depends on:
ii  libc6                       2.11-0exp6   Embedded GNU C Library: Shared lib
ii  libcryptsetup1              2:1.1.0-2.1  libcryptsetup shared library
ii  libhx22                     3.4-1        A library providing queue, tree, I
ii  libpam-runtime              1.1.1-3      Runtime support for the PAM librar
ii  libpam0g                    1.1.1-3      Pluggable Authentication Modules l
ii  libssl0.9.8                 0.9.8n-1     SSL shared libraries
ii  libxml2                     2.7.7.dfsg-2 GNOME XML library
ii  mount                       2.17.2-1     Tools for mounting and manipulatin

libpam-mount recommends no packages.

Versions of packages libpam-mount suggests:
pn  davfs2                     <none>        (no description available)
ii  fuse-utils                 2.8.1-1.2     Filesystem in USErspace (utilities
ii  lsof                       4.81.dfsg.1-1 List open files
pn  ncpfs                      <none>        (no description available)
ii  openssl                    0.9.8n-1      Secure Socket Layer (SSL) binary a
ii  psmisc                     22.11-1       utilities that use the proc file s
pn  smbfs                      <none>        (no description available)
ii  sshfs                      2.2-1         filesystem client based on SSH Fil
pn  tc-utils                   <none>        (no description available)
pn  xfsprogs                   <none>        (no description available)

-- debconf information:
* libpam-mount/convert-xml-config: false



--- End Message ---
--- Begin Message ---
Source: libpam-mount
Source-Version: 2.3-1

We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:

libpam-mount_2.3-1.debian.tar.gz
  to main/libp/libpam-mount/libpam-mount_2.3-1.debian.tar.gz
libpam-mount_2.3-1.dsc
  to main/libp/libpam-mount/libpam-mount_2.3-1.dsc
libpam-mount_2.3-1_amd64.deb
  to main/libp/libpam-mount/libpam-mount_2.3-1_amd64.deb
libpam-mount_2.3.orig.tar.gz
  to main/libp/libpam-mount/libpam-mount_2.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 581...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Kleineidam <cal...@debian.org> (supplier of updated libpam-mount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 19 May 2010 04:05:25 +0200
Source: libpam-mount
Binary: libpam-mount
Architecture: source amd64
Version: 2.3-1
Distribution: unstable
Urgency: low
Maintainer: Bastian Kleineidam <cal...@debian.org>
Changed-By: Bastian Kleineidam <cal...@debian.org>
Description: 
 libpam-mount - PAM module that can mount volumes for a user session
Closes: 528366 581713
Changes: 
 libpam-mount (2.3-1) unstable; urgency=low
 .
   * New upstream release.
     + mount.crypt passes keyfile info to open LUKS volumes
       (Closes: #528366)
     + umount.crypt works again (Closes: #581713)
Checksums-Sha1: 
 9b0c8e74766769b30c472ac63221d5dd38151841 1277 libpam-mount_2.3-1.dsc
 8553bdc50e2308765c6b4a212383f71b9e64227d 418486 libpam-mount_2.3.orig.tar.gz
 5ff2c4f5d0384cfd60f3b89859c9311a8de41b41 24925 libpam-mount_2.3-1.debian.tar.gz
 a19844523e0c5979e5f090a27d0ced284d428e44 132614 libpam-mount_2.3-1_amd64.deb
Checksums-Sha256: 
 483117768d22aff089873894f9aefe6af2b4be19c520cf53ac67539780ff2d0e 1277 
libpam-mount_2.3-1.dsc
 f0fa778879ee74738719e9500623e5f0a1112484e49ec2c53fb5e899a9be07eb 418486 
libpam-mount_2.3.orig.tar.gz
 b35730107abb62800f6c5e40fabe58f8b83f7a7bf0692543b5011920f3cdfbd2 24925 
libpam-mount_2.3-1.debian.tar.gz
 67888794fa952e41baae0c8e97f217eea8d7fccdb1f41014e09bb3424e2691f9 132614 
libpam-mount_2.3-1_amd64.deb
Files: 
 8c1ce3f8aea23f800442d4685e501214 1277 admin extra libpam-mount_2.3-1.dsc
 ec002936997cba017732b07c20411f05 418486 admin extra 
libpam-mount_2.3.orig.tar.gz
 7ada9835534e7ba8e7d0485ae90f7236 24925 admin extra 
libpam-mount_2.3-1.debian.tar.gz
 ce3b974cb9e2a350fbc7732ca70c9928 132614 admin extra 
libpam-mount_2.3-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkv26gAACgkQeBwlBDLsbz6z6gCcDlq3enCPkAxRyRocN87Ofvqk
d/MAn35aj42FiSj+A3z/dqRIjqMYqTo0
=5H9t
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to